6.0.3

Table Of Contents
Examine Installed Plug-Ins
vSphere Web Client extensions run at the same privilege level as the user who is logged in. A malicious
extension can masquerade as a useful plug-in and perform harmful operations such as stealing credentials
or changing the system conguration. To increase security, use a vSphere Web Client installation that
includes only authorized extensions from trusted sources.
A vCenter installation includes the vSphere Web Client extensibility framework, which provides the ability
to extend the vSphere Web Client with menu selections or toolbar icons that provide access to vCenter add-
on components or external, Web-based functionality. This exibility results in a risk of introducing
unintended capabilities. For example, if an administrator installs a plug-in in an instance of the
vSphere Web Client, the plug-in can then execute arbitrary commands with the privilege level of that
administrator.
To protect against potential compromise of your vSphere Web Client you can periodically examine all
installed plug-ins and make sure that all plug-ins come from a trusted source.
Prerequisites
You must have privileges to access the vCenter Single Sign-On service. These privileges dier from
vCenter Server privileges.
Procedure
1 Log in to the vSphere Web Client as administrator@vsphere.local or a user with vCenter Single Sign-On
privileges.
2 From the Home page, select Administration, and then select Client Plug-Ins under Solutions
3 Examine the list of client plug-ins.
vCenter Server Appliance Security Best Practices
Follow all best practices for securing a vCenter Server system to secure your vCenter Server Appliance.
Additional steps help you make your environment more secure.
Configure NTP
Ensure that all systems use the same relative time source (including the
relevant localization oset), and that the relative time source can be
correlated to an agreed-upon time standard (such as Coordinated Universal
Time-UTC). Synchronized systems are essential for certicate validity. NTP
also makes it easier to track an intruder in log les. Incorrect time seings
can make it dicult to inspect and correlate log les to detect aacks, and
can make auditing inaccurate. See “Synchronize the Time in the vCenter
Server Appliance with an NTP Server,” on page 249.
Restrict
vCenter Server
Appliance network
access
Restrict access to only those essential components required to communicate
with the vCenter Server Appliance. Blocking access from unnecessary
systems reduces the potential for general aacks on the operating system.
Restricting access to only those essential components minimizes risk.
Verify Thumbprints for Legacy ESXi Hosts
In vSphere 6 and later, hosts are assigned VMCA certicates by default. If you change the certicate mode to
thumbprint, you can continue to use thumbprint mode for legacy hosts. You can verify the thumbprints in
the vSphere Web Client.
N Certicates are preserved across upgrades by default.
Chapter 6 Securing vCenter Server Systems
VMware, Inc. 213